Zercurity data services
  • Summary
  • Applications (2)
  • Packages (0)
  • Vulnerabilities (9)

libcpupower1

Hashes
CPU frequency and voltage scaling tools for Linux (libraries) libcpupower is a library for inspecting and controlling cpufreq and cpuidle tunables. This package contains the shared library.
  • SHA256: 78c48f8cc156f6b0e6ed757fd9ba3592199341529d6941b07c5d49773f51b69a
  • SHA1: fba82e9b3f3d3f8b8cc9162bc505af521a3cf63f
  • MD5: f609612e25434957ac3bb04957a97146
Information
  • Version: 5.10.127-1
  • Filename: libcpupower1_5.10.127-1_i386.deb
  • Size: 518
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7)

Applications

NameTypeArchSizeRisk
libcpupower.so.1
/usr/lib/i386-linux-gnu/libcpupower.so.0.0.1
219840
libcpupower.so.1
/usr/lib/i386-linux-gnu/libcpupower.so.1
219840

Vulnerabilities

NameRiskSourceFixed
CVE-2021-3365578DSA
DSA-5191-1
CVE-2022-23180DSA
DSA-5191-1
CVE-2022-263650DSA
DSA-5191-1
CVE-2022-337400DSA
DSA-5191-1
CVE-2022-337410DSA
DSA-5191-1
CVE-2022-337420DSA
DSA-5191-1
CVE-2022-337430DSA
DSA-5191-1
CVE-2022-337440DSA
DSA-5191-1
CVE-2022-349180DSA
DSA-5191-1

Raw Object

{
  "sha256": "78c48f8cc156f6b0e6ed757fd9ba3592199341529d6941b07c5d49773f51b69a",
  "sha1": "fba82e9b3f3d3f8b8cc9162bc505af521a3cf63f",
  "md5": "f609612e25434957ac3bb04957a97146",
  "type": "DEB",
  "arch": "I386",
  "name": "libcpupower1",
  "filename": "libcpupower1_5.10.127-1_i386.deb",
  "size": 518,
  "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package contains the shared library.",
  "url": "https://www.kernel.org/",
  "version": "5.10.127-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7)",
  "applications": [
    {
      "path": "/usr/lib/i386-linux-gnu/libcpupower.so.0.0.1",
      "sha256": "02184f9ae550e6395f744da5a7dddbbe5e89ad400d07fc4eb8cdc4e8cfde3c0b",
      "sha1": "ddc6418a4a815908a2c404c19b16c5b5d87341f7",
      "md5": "3ac378bb2c0e02d73596736940d7fc2e",
      "name": "libcpupower.so.1",
      "size": 21984,
      "description": null,
      "package": 3818312,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:08:24+00:00",
      "updated_at": "2022-07-02T03:08:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/i386-linux-gnu/libcpupower.so.1",
      "sha256": "02184f9ae550e6395f744da5a7dddbbe5e89ad400d07fc4eb8cdc4e8cfde3c0b",
      "sha1": "ddc6418a4a815908a2c404c19b16c5b5d87341f7",
      "md5": "3ac378bb2c0e02d73596736940d7fc2e",
      "name": "libcpupower.so.1",
      "size": 21984,
      "description": null,
      "package": 3818312,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:08:24+00:00",
      "updated_at": "2022-07-02T03:08:24+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:15:37+00:00",
      "updated_at": "2022-07-27T20:15:37+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:10+00:00",
      "updated_at": "2022-07-27T20:16:10+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:42+00:00",
      "updated_at": "2022-07-27T20:16:42+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:15+00:00",
      "updated_at": "2022-07-27T20:17:15+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:47+00:00",
      "updated_at": "2022-07-27T20:17:47+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:19+00:00",
      "updated_at": "2022-07-27T20:18:19+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:50+00:00",
      "updated_at": "2022-07-27T20:18:50+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:19+00:00",
      "updated_at": "2022-07-27T20:19:19+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:51+00:00",
      "updated_at": "2022-07-27T20:19:51+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-01T06:37:52+00:00",
  "updated_at": "2022-07-02T02:08:24+00:00",
  "deleted_at": null
}